First published: Wed Jun 16 2021(Updated: )
An issue was discovered on Enphase Envoy R3.x and D4.x devices with v3 software. The default admin password is set to the last 6 digits of the serial number. The serial number can be retrieved by an unauthenticated user at /info.xml.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Enphase Envoy | =d4.0 | |
Enphase Envoy | =r3.0 | |
Enphase Envoy Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-25753 is considered a critical vulnerability due to the use of a predictable default admin password.
To fix CVE-2020-25753, update the firmware of your Enphase Envoy devices to a version that has addressed this vulnerability.
CVE-2020-25753 affects Enphase Envoy R3.x and D4.x devices running version 3 software.
An attacker can exploit CVE-2020-25753 by accessing the serial number via /info.xml, which is publicly accessible, and then using it to obtain the default admin password.
A temporary workaround for CVE-2020-25753 is to change the default admin password to a strong, unique password immediately.